instruction
stringlengths
24
29.9k
I have a python-script being run regularly on my Linux system by means of a cron daemon process - every weekday 18:00 scraping stockmarket data. This scraping script is placed in cgi-bin folder so that it can be run on a remote client. Port 80 is open on the default gateway Webbserver: Apache2 No domainname is bound to...
Let's say I have the following url: https://secure.sub.domain.com/?continue=https://sub.domain.com I found out that I can put anything I want before sub.domain.com in the continue parameter as long as sub.domain.com is present in that parameter, for example: ?continue=https://google.com-sub.domain.com. I tried to bypas...
Recently a utility provider has started to attach a zip file including my bill inside, however, they have secured the zip file using my online web account password. I am not too concerned about somebody getting my bill, however, it concerns me in two other ways... First, would this now allow for easier dictionary attac...
Facebook tends to "recommend" your account based on IP and collected data. How do I keep it hidden from people that are geographically related to me? I want to create a pseudo-anonymous account that isn't linked to my real identity in any way.
To me, security is most important topic for messaging or video conference applications. I am searching if end to end encryption is possible for group chat or group video conference. There so some methods like TLS and SRTP (with AES encryption specification ) to encrypt media and signalling data for end to end communica...
I recently discovered that on one of my PCs the SolarWinds software was installed. I didn't install this software on my machine. I also saw that SolarWinds was cracked by Russian hackers and also companies like Microsoft have a lot of data leaks. Is it possible that I'm a victim of a hacker attack? And what I can do no...
Just out of curiosity, could you provide (old) real world X.509 v2 certificate examples that include the deprecated (in some version of X.509) and forbidden (in RFC 5280) issuerUniqueIdentifier or subjectUniqueIdentifier fields?. A bonus point would be pointing at any application, library or whatever capable of generat...
I want to collect certain data from my application using the driver and transfer it to the server to check its integrity. And I want to sign these packages using TPM to avoid forgery. However, a user can trick my program by writing a similar driver and intercepting, for example, messages to and from the server, replaci...
I looked at a certificate of (e.g. stackoverflow) a website and the fingerprint in chrome was different then microsoft edge, so I was wondering how it that possible? chrome: f67e91c916ce8f5f8aee8abdf99328613dd298a3 edge: 3D:BB:0B:22:63:21:01:3B:1B:6A:2D:9A:FF:5A:84:5B:25:C0:D3:17:49:B9:15:42:EC:50:3A:D7:1A:67:7F:2F ...
I came across a very interesting case: The user uploads a file The file contains <script>alert(2)</script> The web app shows the file's content to the user -> the XSS payload is executed The file is not stored in any way, shape or form (forget about Stored XSS) There's no anti-CSRF token on the file upload XSS via Fi...
I clicked on a phishing website. I was surprised to find that this website looked exactly like google and had my information displayed. The information displayed were my email and my profile picture. I quickly left the website without knowing what to do. Can someone access my google account even if I changed the passwo...
I know servers have something to block you from just sending them an HTTP request that is actually some malware or a webpage that is malicious, because it would be so easy to just spam HTTP requests with malware. Code red used something more advanced than that by spamming an HTTP request with Ns. Also, I wonder if some...
I'm definitely understanding something wrong with the TLS process, and am hoping one of you fine folks will point out the flaw in my thinking. So from what I've read on TLS, the client (and therefore any man in the middle (MITM)) knows or receives a web server's certificate, which amongst other things contains the publ...
I'm trying to consume a payment processor API (not developed by my), but (being honest) I don't know anything about security, I don't understand API keys and authentication, I have multiple questions about API's that I couldn't resolve no matter how much research I did, the questions are: What could happen if someone ...
I was testing Burp Suite Crawl on some old php sites I made and it found Sleepy User-Agent SQL injection vulnerability User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/69.0.3497.100 Safari/537.36 '+(select*from(select(sleep(20)))a)+' And I am wondering how this can b...
I'm currently working on a library with secure authentication process. I wanted to support ppk file loading for ed25519 private keys. I used the original source code of putty to determine how the decoding of password protected files worked. I generated a demo file with a password protected and a non password protected ...
In my test setup I have a root CA only. I also have a node cert (joe0.lab.local.pem). I did the following: openssl verify -CAfile ca.pem joe0.lab.local.pem joe0.lab.local.pem: CN = joe0.lab.local error 20 at 0 depth lookup:unable to get local issuer certificate The node cert was NOT signed by ca.pem. Is this the e...
I'm trying to generate all possible variation of a password. The base word is like "PleaseSub!" and I need all possible version of it with uppercase, lowercase, etc.. I know there is something like 2^10 options but I can't figure out how to generate it with crunch or any other tool. Any idea?
We are setting up an authentication system using Cognito and Amplify. We noticed that Amplify suggests Secure Remote Password as the default. I can understand the benefits of SRP for protecting against man-in-the-middle and such attacks. But it seems there is a downside too: for example, the server is unable to perform...
I need to block all the Internet connections that don't go through a VPN server before they even get the chance to happen. How can I achieve this on Mac OS Big Sur? Mac OS doesn't seem to have any embedded tools that would allow me to do so (unlike Android, for example). Maybe there's a router firmware that would allow...
What is the best place to store certificates and keys which are confidential and sensitive? As I understand LUKS is fine and kernel transparently handles encryption/decryption. Also, the LUKS volume could contain anything and everything like a normal file system. On the other hand, I came across softhsm from OpenDNSSec...
I am working at a university where we are creating a Website that allows students to apply for scholarships. Rather than print the application form, sign it then scan it then return it back, the website allows student to digitally sign the application forms (aka e-signature). Since there are multiple documents which th...
I am testing this application which sends JWT and CSRF token in cookies, I created a PoC file to test for CSRF, but only CSRF token is being sent in the PoC request and not JWT. I was under the impression that cookies are always sent in all requests regardless of the domain sending those requests, this is the reason CS...
I'm trying to implement the putty file format in one of my dart packages. Implementing the actual key loading was ok, but I'm struggeling with the mac validation. I'm not shure what I'm doing wrong here The putty code is quite clear about how to check it, but something is still wrong here. The putty code generates the ...
As stated in title - I am wondering if connecting my printer to ISP-provided router could expose all of my printed data to his eyes? Cheers!
I have REST APIs which are behind a webserver, then there is a custom single page application frontend hosted on it (React). It goes like that: The user logs to the index page, if the session cookie is not present they gets redirected towards the login page The user logs and gets redirected to the index: all the reque...
I recently set up a local server on my home network to host some files and personal webapps. In an attempt to improve security, I bought a pfsense-based firewall. I know some basics of networking but I'm not particularly advanced, so I tried to do some general reading about firewalls as I was setting things up. There w...
I have an exam next week. I need help. This is my lab: attacker machine (kali) : 192.168.1.81 1st hacked machine (Windows 10) : 10.10.10.130 target (Windows 7) : 10.10.10.135 (have an MS17-010 exploit) Steps I follow: I hacked the Windows 10 machine I got a reverse shell via netcat on net then ...
So today I switched from Lastpass (chrome extension and iOS app) to bitwarden. So far so good, it was really easy to export my lastpass data and import it in bitwarden however what I am wondering is how LastPass knew I used the same passphrase with bitwarden ! Let's say my lastpass passphrase was "CorrectHorseBatterySt...
Say I make a social-media website and forget to include the htmlspecialchars() function. If the website uses infinite scrolling (that will eventually show every post on the website if you scroll down far enough), and somebody exploits the XSS, does everyone visiting the site get the XSS attack?
I understand this might be a usual question but I thought it'd be interesting to get people's feedback regardless as this relates to security. In games, in particular I am thinking about Minecraft, there is this functionality called resource packs. In addition there are also shader packs but I will get to those later. ...
Coming from Windows to macOS, I was surprised that the firewall was off by default. I immediately turned this feature on. Would this be necessary? Are there some cons to having the firewall on that I am not aware of hence why Apple turned it off?
Websites release statistics on their user base all the time and it’s not considered a breach of privacy because their user bases are so large that it’s impossible to pick apart who thinks or watches what. Additionally when nations or states or counties release election results it is impossible to figure out who voted f...
We have done vulnerability analysis with third party security team. They have mentioned one point as critical findings but i don't understand risk associated with it and suggested remedial action also bit confusing. Finding : Same web application can be access by two different URLS. Ex: http://1.1.1.1/abc, http://examp...
I have a website that uses ManageEngine Service Plus and it has a SQL injection vulnerability the linksays that with the help of the following url we would be able to inject postgresql commands to get the complete control of the system: /reports/CreateReportTable.jsp?site=0 AND 3133=(SELECT 3133 FROM PG_SLEEP(1)) I do...
I exposed my browser cookie of my request header in a web forum. After I realized what I have done - I logged out, cleared my browser and logged in again. Am I safe now? Can someone still use that browser cookie to impersonate me?
I have enabled DMARC settings in my domain (drkotzi.org). Now when I send emails from my email address (sales@drkotzi.org) to email lists or email groups, I can see that the email's from address and to address become identical. can someone please tell me why this is happening? because of this sometimes my emails are no...
I wrote an openssh-key-v1 Protocol reader and extracted all fields according to the format definition: "openssh-key-v1"0x00 # NULL-terminated "Auth Magic" string 32-bit length, "none" # ciphername length and string 32-bit length, "none" # kdfname length and string 32-bit length, nil # kdf (0 length, no ...
We have an application which have purchased from a 3rd party and host in our own environment. The application consists of its own UI and back-end, and is included in our own application through an iframe. During a recent scan by our security vendor, they have identified a few high risk vulnerabilities within the 3rd pa...
I'm working on an Android application with few millions of users. The app has some financial|payment features. We have some public APIs and some authenticated ones (OAuth2). As a part of enhancing our security, we are currently using "Certificate Pinning". The problem is, our app gets repackaged by some people to disab...
I have a little project for authentication and I need to store an encryption key on website B which I get from the server on website A, but the server from website B should not be able to read it. Is this possible without a browser extension? How would something like this be implemented? I guess the broader question is...
Is it possible to decrypt a RSA message if the characters of the message are individually encrypted? The info you have is the message, the public key and the n which is too big to be factorizable.
I am working on the auto-routing functionality of Codeigniter 4 and I'd like to test it by sending some nasty exploit-type HTTPS requests to make sure it properly resists mischief. E.g., request a uri with .. in the path to see if we might execute some arbitrary PHP file on the server. I've tried a url like https://exa...
Suppose I have the following 3 files with content: file1.txt: This is file1.txt. It is labeled red. file2.txt: This is file2.txt. It is labeled green. file3.txt: This is file3.txt. It is labeled blue. Suppose these 3 files are stored on my linux file system at: /home/shared Finally, suppose I have 3 users who ...
I couldn't find any deep dive info about PIN management in Bitwarden. And I'm not able to read their code, not qualified enough. Are there people around here who can explain how PIN protection works with Bitwarden browsers extensions? When the vault is locked and you use your master key to unlock, I am confident no key...
Say there is a SQL database that stores certain records in encrypted. A person wants deletion of a record in a way that even hard drive recovery services cannot recover it without breaking the hard drive. Is it possible to delete records this way?
Consider a use-case in which a single page application using an OAuth identity flow has to use one of many possible identity providers, as determined by what user is logged in. More specifically, I log in using my credentials for Company A, and the app directs the client app to use Okta, and if I log out and log in aga...
Alice bought 1 Bitcoin and encrypted her wallet.dat in Bitcoin Core. Samantha, Alice's friend, notices the Bitcoin price skyrocketing and, while Alice is in the bathroom, steals Alice's wallet.dat as well as important.txt and goes home. There she discovers that it's passphrase-protected, so she cannot transfer the coin...
I have two sha256 hashes as hex strings HASH1=b5bb9d8014a0f9b1d61e21e796d78dccdf1352f23cd32812f4850b878ae4944c HASH2=7d865e959b2466918c9863afca942d0fb89d7c9ac0c99bafc3749504ded97730 now I want to create a new SHA256 that depends on these two hashes (for a merkle-tree structure). Any two hex representations of the same...
I am trying to encrypt one of my primary Linux partition (5GB) by following this example to encrypt. I want to confirm some of my understandings: Salt is automatically generated by cyrptsetup with luks? --iter-time and --hash only affects the time to "open" the encrypted partition? Such that it doesn't affect read la...
I was sending a voice note to a friend and when I listened to it, the first ~6 seconds were completely normal and then something weird happened. A radio transmission from some radio station (I don't know which one) cut in after a weird sound. Does anyone know what could have happened? Is it possible some radio transmis...
If the same Facebook Messenger account is opened on my device and on another device, and my device's Messenger app is allowed access to photos, can my device's photos be viewed or hacked on the other device?
If an nmap attacker started a port scan on my network, would changing my network IP address prevent/halt it?
I have been looking at tips to securing Websocket Connections and found this article https://portswigger.net/web-security/websockets which states that one should "Hard code the URL of the WebSockets endpoint, and certainly don't incorporate user-controllable data into this URL." Currently I have been taking a part of t...
I am trying to become familiar with Snort, and for this reason, I have set three VMs. A Kali, a windows machine with XAMPP and Ubuntu where I installed Snort. I believe I have Snort running in Afpacket Inline mode. Whenever Snort starts it says " Enabling inline operation-Running in IDS mode" On the windows machine, th...
I am trying to make a combinator attack using just one dictionary: word1 word2 word3 word4 word5 ... And would like to try all 4-words-length permutations separated by commas: word1,word2,word3,word4 word1,word3,word4,word2 word2,word3,word6,word1 ...
I would like to know which method is more secured. I know that they can be combined, but I would like to understand why TPM or OpenSSL might be a more secure technique to generate (encryption, decryption) keys
From mozilla Mixed passive/display content is content served over HTTP that is included in an HTTPS webpage, but that cannot alter other portions of the webpage. For example, an attacker could replace an image served over HTTP with an inappropriate image or message to the user. The attacker could also infer informatio...
I am looking for a login security measure where it is keylog and screen capture proof. Is there some type of login security like a 2FA without the need of a second device, but remembering a pattern or a formula which is used to solve a dynamic puzzle that is given to the user on login? Say I am shown 100 words during l...
Is it possible to use the Gutmannr method for a single SQL cell?
Can anyone explain me what's this trend of providing passwords and OTP codes on the same service? What benefit or value are they trying to bring to the table? We, as security professionals, have been fighting for the adoption of 2FA for a long time, and now that we are reaching a wider coverage, password managers are i...
I've often heard people talking about not using the same password on every website. What's the deal if servers store passwords in a SHA hash instead of plain text? The most they can do is spam you with junk mail, right?
Let's say Alice has three secrets: SecretA, SecretB, SecretC Alice shows these three secrets to Bob and gets a single signature from him that signs all three secrets together. Something like Signature = Sign(Hash(SecretA, SecretB, SecretC)) Of course some care needs to be taken here with the hash function to avoid sec...
Consider an API that requires a JWT for authorisation. For each JWT presented, it has to validate the signature, including base64 decoding, hashing and asymmetric encryption, which is stated noted as being more computationally expensive than symmetric encryption. Consider if an attacker creates thousands of unique JWT...
I came across SoftHSM2 from OpenDNSSec(BSD license) which is a drop-in replacement for HSM except that SoftHSM2 only lacks physical security. Also, being the fact that PKCS#11 is the standard interface to work with both SoftHSM2 and HSM/TPM without any changes in code, it stands as a good choice to me. Thus, it would a...
If multiple Strict-Transport-Security headers are set with different settings (e.g. different max-age values), how will the browser behave? Does the browser just follow one of them, or simply error out and discard all? Is this behaviour different across various browsers?
Sci-Hub is a piracy website that provides free access to usually-paywalled academic papers & books. Sci-Hub's owner Alexandra Elbakyan says that many people with legitimate access to the papers/books donate their user IDs and passwords, which she then uses to acquire the paywalled material. Countering the owner's claim...
I don't have much experience in buying and installing ssl certificates. I have one website like certificates.xxxxx.com. So, my question is that can I buy a standard ssl certificate from GoDaddy to protect this one website. xxxxx.com itself is a website which is protected by a website but I want to buy a separate for ce...
I'm creating a mobile app which has chat feature in it. Since I wanted to make it secure, I'll do some encryption to messages and the data. I'm thinking of using End-To-End encryption for it but I've got some issues. Each user will have private and public keys to encrypt and decrypt the data (asymmetric key encryption)...
I'm checking some HTTP headers in the server response. I get a 404 error page. Could in some scenario an attacker leverage a missing X-Frame-Options header in a 404 page?
I have a domain name under .money, which supports DNSSEC. However, my registrar hasn't done DNSSEC with this TLD before and is asking me to supply the Key Tag, Algorithm Type, Digest Type and Digest -- and they will set them. However, I am lost on how to obtain the right values from the TLD. Can I query them from the r...
After my other post I'm looking over some other possibilities to do what I'm trying to do. How To Recover End-To-End Encrypted Data After Losing Private Key? If I save user data in server, in order to restore the data I should have the key to unlock the encryption which is not safe. If I don't have the key then I cant ...
Many tools enable to list accepted ciphers but not all of them verify if these ciphers are secure. For example, Nmap with script ssl-enum-ciphers ranks some ciphers as secure even though actually this ciphers are not recommended anymore (for example do not support PFS). I often use https://ciphersuite.info/ to verify i...
I am planning to create a system, but I still have some questions about security. I would like to know if it makes sense to block unauthorized users from accessing the system, through the ip, using a PHP script and also firewall rules by AWS EC2, would this be good practice to prevent unauthorized users from accessing ...
Assuming secure code practices are all adhered to for both applications, is a thousand-tier/n-tier microservices application or a monolithic application more secure? From a monitoring, visibility standpoint, etc. I am trying to understand which paradigm is a more secure paradigm.
We have a web application on https port with server certificate valid from 01/01/2021 and valid to 31/12/2021. Due to some constraints the clients which are going to use web application are behind current date, while the server is on current date time. There is no issue in production as server and client both are on th...
I would like to know if I can use my SSL certificates that I use on my website (based on nodejs and express) for access to mysql database remotely, or if it is better to create new certificate. My webserver has access to the database by localost, but I would like to access remotely to change data with phpmyadmin.
For a toy CLI application I'm writing, I'd like to store a string with an user defined command that will be executed periodically (like shell -c <command_string>). I have seen other applications do this, for example in fzf you can set an environment variable with a command to be executed every time the application runs...
I've been watching these videos on YouTube about some British-sounding male (with millions of views) busting Indian scammers. It is never explained how exactly he is able to do this, with him basically implying that he's some sort of Hollywood "hacker". Even assuming that what he does is technically illegal, and thus "...
For SPA/frontend apps, you should be using PKCE these days for OAuth flow. But the backend apps have this additional complexity of having to have a secret key and use that key to talk to the token endpoint. Why not just use PKCE on the backend, too?
I've been researching timeless timing attacks, ie: timing attacks using concurrency rather than round trip time. Here is an article by portswigger with links to the original article by Van Goethem. Basically it says that if you pack two requests into a TCP packet for HTTP/2 or Tor, then it will cancel out network jitte...
Let's say I have a MySQL database with thousands of user accounts in it. These accounts contain lots of data, but for verification purposes, they each contain a username and a (hashed and salted) password. Now, when a user requests signing in, I will take a username and password from them, transfer it via WSS to a Node...
in https://twitter.com/nnwakelam/status/1363761612423786496, its tweeted: fucking yikes.. ran every bitcoin exchange for a really common shell and found.... Uname: Linux cloudimage 4.4.0-166-generic #195-Ubuntu SMP Tue Oct 1 09:36:25 UTC 2019 i686 User: 33 [ www-data ] Group: 33 [ www.data ] 7.0.33-0ubuntu0.16.04.16 ...
This question is a bit of a follow on to this Q&A: TLS 1.2 Handshake: Does the server have to take all extensions sent by the Client? If the client sends an Extension that the server does not recognize, the server can simply ignore it and continue with a Server Hello -- the client is then free to terminate the session ...
I have some sensitive data that I need to encrypt and retain long-term (i.e., 5+ years at least). I'd ideally like to secure it using multiple hardware devices via a Shamir share. Something like: data_key = gen_symmetric() encrypted_data = encrypt_and_mac(key=data_key, payload=data_to_encrypt) s1, s2, s3 = shamir(k=2, ...
I stumbled on a Windows bug leading to code execution. I believe it should be categorized as a vulnerability but Microsoft does not recognize it as such. I would like to read other opinions. Functionality The bug affects the context menu "Open PowerShell here" which is activated when a user SHIFT-right clicks on a fold...
I would like to know if the non-exportable private key option, virtualized based security, selected when importing an RSA certificate guaranteed although the user will never be able to see the RSA private key (in clear)? According to my tests, indeed the private key seems usable in the code but the access to the raw v...
Is it possible that after I dump a SQL Database created with prepared statements as an ".sql" file, and then I import it again, that the import may be vulnerable to SQL Injections?
I want to use username and password instead of public key cryptography for a decentralized peer-to-peer application, but since the passwords are stored on users' computers, there is a possibility of being stolen. How do I store the passwords securely? And how do I give permission safely? How can I prevent someone else ...
There are two ways I can think of to format strings in Python where user input may make its way into the format string input: >>> a = input() >>> print(a % ()) >>> a = input() >>> print(a.format()) I understand that in both of the above scenarios, it may be possible to leak secrets (https://security.stackexchange.com...
I have few sensors, a microcontroller with a bluetooth module and an android app to visualize the data. how can I make sure my system only connects to phones that activated bluetooth through the app? Is there a specific method to achieve this? My data is just a bunch of numbers. Should I use encryption? Is there any r...
In the scenario of a hybrid encryption for which I use RSA (asymmetric) to encrypt the encryption key used with AES (symmetric) to encrypt my message, I need to store the encrypted key together with the cipher text and all in the same column of the DB in order to then be able to request this value pair and perform the ...
I've seen conflicting opinions on whether or not setting a cipher order is recommended. testssl.sh prints a red warning when no cipher order is encountered, implying that a lack of cipher order is considered a deficit. It also makes intuitive sense that a server should begin by offering the strongest ciphers first, and...
Basically I have a few files / folders that I want permanently deleted. I deleted them securely with hardwipe, but when I try to search into the folder where they were located with Wondershare Recoverit, the foldernames, filenames, even some parts the docs/txt's/images are still visible even partly recoverable. I've tr...
I'm planning to extend my pentest services to Password Cracking, to be more precise: Cracking Active Directory Passwords, extracted from the customers Active Directory in order to check users passwords. Now I did some research, but there are so many different ideas and suggestions. Also, a lot of articles are many year...
JWT tokens are self-contained. If a valid JWT token contains username and the token is valid, then the endpoint will think user is authenticated. The token can be decoded and all fields seen. What if I generate token on my side and fill it with data I saw, how will the system distinguish my token from it's own ones?
I'm reading the OWASP Authentication Cheat Sheet, but it obviously is focused only on web browser. I'm searching for something similar for a desktop app. I want users to login to a desktop app. The password will be saved on system vault. So user don't login every day. Each desktop app has an unique id used for login an...
So I found a backdoor, multiple trojans and crypto miners in a client's PC. He is worried that his personal information has been compromised. What happened: During the installation of Kaspersky anti-virus, a user account control prompt appeared with "Kaspersky" on the name of it, but it was not from a verified publishe...
It happens that I participate in a bug hunting program and analyzing the app I realized that there is a particular parameter that is very important for access control and that only changes with the IP address. Anyway, the question here is if I can set a specific public IP address. I don't need to receive a response, ju...
On a website which uses mORMot 1.18 every request made by an authenticated user is in this format: ../search_items?session_signature=0000004C000F6DD02E24541C as reported within the framework docs Here is typical signature to access the root URL root?session_signature=0000004C000F6BE365D8D454 In this case, 0000004C is ...